Show filters
340 Total Results
Displaying 81-90 of 340
Sort by:
Attacker Value
Unknown

CVE-2023-20129

Disclosure Date: April 05, 2023 (last updated October 08, 2023)
Multiple vulnerabilities in the web-based management interface of Cisco Prime Infrastructure and Cisco Evolved Programmable Network Manager (EPNM) could allow a remote attacker to obtain privileged information and conduct cross-site scripting (XSS) and cross-site request forgery (CSRF) attacks. For more information about these vulnerabilities, see the Details section of this advisory.
Attacker Value
Unknown

CVE-2023-20069

Disclosure Date: March 01, 2023 (last updated October 08, 2023)
A vulnerability in the web-based management interface of Cisco Prime Infrastructure and Cisco Evolved Programmable Network (EPN) Manager could allow an authenticated, remote attacker to conduct a stored cross-site scripting (XSS) attack against a user of the interface on an affected device. This vulnerability is due to insufficient validation of user-supplied input. An attacker could exploit this vulnerability by persuading a user of an affected interface to click a crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information. To exploit this vulnerability, the attacker would need to have valid credentials to access the web-based management interface of the affected device.
Attacker Value
Unknown

CVE-2022-37329

Disclosure Date: February 16, 2023 (last updated October 08, 2023)
Uncontrolled search path in some Intel(R) Quartus(R) Prime Pro and Standard Edition software may allow an authenticated user to potentially enable escalation of privilege via local access.
Attacker Value
Unknown

CVE-2022-34157

Disclosure Date: February 16, 2023 (last updated October 08, 2023)
Improper access control in the Intel(R) FPGA SDK for OpenCL(TM) with Intel(R) Quartus(R) Prime Pro Edition software before version 22.1 may allow authenticated user to potentially enable escalation of privilege via local access.
Attacker Value
Unknown

CVE-2022-33902

Disclosure Date: February 16, 2023 (last updated October 08, 2023)
Insufficient control flow management in the Intel(R) Quartus Prime Pro and Standard edition software may allow an authenticated user to potentially enable escalation of privilege via local access.
Attacker Value
Unknown

CVE-2022-33892

Disclosure Date: February 16, 2023 (last updated October 08, 2023)
Path traversal in the Intel(R) Quartus Prime Pro and Standard edition software may allow an authenticated user to potentially enable escalation of privilege via local access.
Attacker Value
Unknown

CVE-2022-32570

Disclosure Date: February 16, 2023 (last updated October 08, 2023)
Improper authentication in the Intel(R) Quartus Prime Pro and Standard edition software may allow an authenticated user to potentially enable escalation of privilege via local access.
Attacker Value
Unknown

CVE-2022-26888

Disclosure Date: February 16, 2023 (last updated October 08, 2023)
Cross-site scripting in the Intel(R) Quartus Prime Pro and Standard edition software may allow an authenticated user to potentially enable information disclosure via local access.
Attacker Value
Unknown

CVE-2022-26840

Disclosure Date: February 16, 2023 (last updated October 08, 2023)
Improper neutralization in the Intel(R) Quartus Prime Pro and Standard edition software may allow an authenticated user to potentially enable escalation of privilege via local access.
Attacker Value
Unknown

CVE-2023-20068

Disclosure Date: February 01, 2023 (last updated October 08, 2023)
A vulnerability in the web-based management interface of Cisco Prime Infrastructure Software could allow an unauthenticated, remote attacker to conduct a reflected cross-site scripting (XSS) attack against a user of the interface on an affected device. This vulnerability is due to insufficient validation of user-supplied input. An attacker could exploit this vulnerability by persuading a user of the web-based management interface on an affected device to click a crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or to access sensitive, browser-based information.